IT PARK
    Most Popular

    5 Reasons You Should Prototype IoT Devices

    May 23, 2025

    Big Data Case Study Sharing - "Interesting Big Data"

    May 04, 2025

    Blockchain Common Consensus Mechanisms

    May 11, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      Cell phone "a daily charge" and "no power to recharge", which is more harmful to the battery?

      Jun 04, 2025

      Why does the phone turn off when the remaining battery is not zero

      Jun 03, 2025

      Internet era! How to prevent personal information leakage

      Jun 02, 2025

      Which one to choose for mobile power? Analysis of the three major types of battery cells

      Jun 01, 2025

      What is IMEI code

      May 31, 2025
    • AI

      Driving Generative AI Pervasiveness: Intel's "duty to do so"

      Jun 04, 2025

      First U.S. Election in the Generative AI Era

      Jun 03, 2025

      Artificial intelligence: Hollywood writers' strike triggers

      Jun 02, 2025

      GPT-4 will allow users to customize the "personality" of the AI, making the avatar a real "person"

      Jun 01, 2025

      What industries ChatGPT may disrupt in the future

      May 31, 2025
    • Big Data

      To read big data, you have to master these core technologies first

      Jun 04, 2025

      Your privacy, how does big data know

      Jun 03, 2025

      Accurate data is more important than more data in the healthcare industry

      Jun 02, 2025

      Gartner: Data Analytics Helps Build a New Equation of Business Value

      Jun 01, 2025

      How to Improve Big Data Performance with Low Latency Analytics?

      May 31, 2025
    • CLO

      Major Cloud Computing Service Providers

      Jun 04, 2025

      On the Importance of Cloud Access Security Agent CASB

      Jun 03, 2025

      The importance of cloud technology for agile supply chain

      Jun 02, 2025

      What is the relationship between cloud computing and cloud storage? The 3 major disadvantages of cloud computing explained!

      Jun 01, 2025

      Cloud computing and data science, five steps to break through the flood of information

      May 31, 2025
    • IoT

      6 Ways to Make Money for IoT Products

      Jun 04, 2025

      Berlin showcases smart city innovations

      Jun 03, 2025

      IoT solutions lay the foundation for more effective data-driven policing

      Jun 02, 2025

      CO2 reductions won't happen without digital technology

      Jun 01, 2025

      4 Effective Ways the Internet of Things Can Help with Disaster Management

      May 31, 2025
    • Blockchain

      Which is better for the logistics industry and blockchain

      Jun 04, 2025

      Will blockchain revolutionize the gaming industry?

      Jun 03, 2025

      How do you make a blockchain investment?

      Jun 02, 2025

      What is the connection between blockchain and Web 3.0?

      Jun 01, 2025

      Canon Launches Ethernet Photo NFT Marketplace Cadabra

      May 31, 2025
    IT PARK
    Home » AI » Google has categorized 6 real-world AI attacks to prepare for immediately
    AI

    Google has categorized 6 real-world AI attacks to prepare for immediately

    There are 6 common attacks faced by modern AI systems: hinting attacks, training data extraction, backdoor manipulation of models, adversarial examples, manipulation of training data of models using data contamination attacks, and data leakage attacks.
    Updated: May 26, 2025
    Google has categorized 6 real-world AI attacks to prepare for immediately

    Google researchers have identified six specific attacks against real-world AI systems, finding that these common attack vectors exhibit a unique level of sophistication that they note will require a combination of adversarial simulations and the help of AI experts to build a solid defense.

    In a report released this week, the company revealed that its dedicated AI Red Team has identified a variety of threats to this rapidly evolving technology, based primarily on how attackers manipulate the Large Language Models (LLMs) that drive generative AI products like ChatGPT, Google Bard, and others.

    These attacks largely lead to technologies that produce unintended or even maliciously driven results, which can lead to consequences ranging from the mundane, such as photos of ordinary people appearing on celebrity photo sites, to the more serious, such as security-evading phishing attacks or data theft.

    Google's findings come hot on the heels of its release of the Secure Artificial Intelligence Framework (SAIF), which the company says is designed to address AI security before it's too late, as the technology has experienced rapid adoption, creating new security threats.

    6 Common Attacks Facing Modern AI Systems The first set of common attacks identified by Google are hint attacks, which involve "hint engineering." This is a term that refers to the production of effective hints that direct LLM to perform desired tasks. When this influence on the model is malicious, it can in turn maliciously influence the output of an LLM-based application in ways that are not intended, the researchers said.

    One example would be if someone added a paragraph to an AI-based phishing attack that was not visible to the end user, but could instruct the AI to classify the phishing email as legitimate. This could allow it to bypass email anti-phishing protections and increase the chances of a successful phishing attack.

    Another attack the team discovered is training data extraction, which targets the reconstruction of verbatim training examples used by LLM - such as content from the Internet.

    In this way, attackers can extract confidential information, such as verbatim personally identifiable information or passwords, from the data. "Attackers have an incentive to target personalized models or models trained on data containing personally identifiable data to collect sensitive information," the researchers wrote.

    A third potential AI attack is backdoor manipulation of models, where an attacker "may attempt to covertly alter the behavior of a model to produce outputs that are incorrectly characterized by specific 'trigger' words or features, also known as backdoors," the researchers wrote. In this type of attack, a threat actor can hide code in the model or its output to perform malicious activities.

    The fourth type of attack, called adversarial examples, is when an attacker provides an input to a model that results in a "deterministic, but highly unexpected output," the researchers wrote. In one example, the model could display an image that looks like one thing to the human eye, but the model recognizes it as something completely different. Such attacks can be fairly benign, and in one case, someone could train the model to recognize a photo of himself or herself as one deemed worthy of appearing on a celebrity website.

    An attacker could also use a data contamination attack to manipulate the model's training data to influence the model's output based on the attacker's preferences-which could also threaten the security of the software supply chain if developers are using AI to help them develop software. The impact of such an attack could be similar to backdoor manipulation of models, the researchers noted.

    The final type of attack identified by Google's specialized AI red team is a data leakage attack, in which an attacker can copy a model's file representation to steal sensitive intellectual property or other information. For example, if a model is used for speech recognition or text generation, an attacker might try to extract speech or text information from the model.

    google AI system attacks
    Previous Article What industries ChatGPT may disrupt in the future
    Next Article The "Dirty Work" Artificial Intelligence Cannot Do - Commercial Content Auditing

    Related Articles

    AI

    AI reads brains and deciphers people's inner monologues! Will it read all my secrets?

    May 09, 2025
    AI

    Generative AI designs unnatural proteins

    May 24, 2025
    AI

    Can AI work this round when you ask a doctor online to break a disease?

    May 19, 2025
    Most Popular

    5 Reasons You Should Prototype IoT Devices

    May 23, 2025

    Big Data Case Study Sharing - "Interesting Big Data"

    May 04, 2025

    Blockchain Common Consensus Mechanisms

    May 11, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.